• 제목/요약/키워드: Ubiquitous IT

Search Result 2,253, Processing Time 0.026 seconds

An Empirical Study on the Necessity of Ubiquitous Public Service: Focused on Chungju City Public Officials' Recognition (유비쿼터스 공공서비스 도입 우선순위에 대한 실증분석: 공무원의 인식조사를 중심으로)

  • Kang, Min-Gu;Kim, Tae-Jin
    • Spatial Information Research
    • /
    • v.15 no.3
    • /
    • pp.219-236
    • /
    • 2007
  • This study is intended to examine the types of U-public service that can be introduced to the public sector by making an empirical analysis on Chungju City public officials. Specially, to analyze the public officials' recognition of the types of ubiquitous public service that can be introduced to the public sector, this study investigates the utility and necessity of ubiquitous information technology when making use of it in terms of administrative concepts. To achieve study purpose, this study examines what type of U-public service is highly likely to be applied and basically has to be applied when ubiquitous information technology is applied to the current environment of Chungju City in stages.

  • PDF

Empirical Study on the Ubiquitous Computing Characteristics Affecting the Use of U-Service (U-서비스 이용에 영향을 미치는 유비쿼터스 특성에 관한 실증연구)

  • Jang, Ki-Sup;Kim, Chang-Su;Kim, Ki-Su
    • The Journal of Information Systems
    • /
    • v.16 no.4
    • /
    • pp.51-73
    • /
    • 2007
  • Ubiquitous computing is enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user. To facilitate the successful adoption and diffusion of ubiquitous computing, it is necessary to figure out the factors affecting the use of U-service. Though the research related to ubiquitous computing has been vigorously conducted from the aspect of system and service provider, there have been very few studies that focus on the user's perspective. Therefore, this study attempts to figure out major factors which are dedicated to the development of ubiquitous computing and u-service, and that ultimately influence the u-business outcome. This study derived the factors that characterize u-service, such as ubiquity, contextual offer, reliability, invisibility, and confidentiality, which are then combined in the TAM model and carry out the path analysis. The research findings indicate that ubiquity affects both the perceived usefulness and perceived ease of use. The reliability and confidentiality were found to affect the perceived usefulness, whereas the contextual offer and invisibility turned out to influence the perceived ease of use. Finally, the relationship among the perceived usefulness, perceived ease of use, and the attitude toward using are identical with the previous research findings related to the technology acceptance model(TAM).

  • PDF

Context-Awareness Technology for Location Based-Service for Ubiquitous Learning (U-Learning을 위한 위치 기반 서비스로서의 상황 인식 기술)

  • Kim, Hye-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.11
    • /
    • pp.4869-4874
    • /
    • 2011
  • In this paper, we defined constructivism and ontology theory and associate it in Location Based Service ubiquitous learning. And this paper aims to provide a clear vision about location based service (LBS) ubiquitous learning. The typical ubiquitous learning involving the Context Aware Intelligent system was presented. Also the Architecture for learning environment including the key idea and technical concept is being presented in this paper. Guided with these principles and with the advancement of information and communication technology the context-awareness based on Artificial intelligence for Location based Service for ubiquitous Learning was conceptualized. U-learning for Location Based Service is presented here and the concept behind this new learning paradigm. The learning environment architecture which comprises the entire component is illustrated here.

Design of Anonymity-Preserving User Authentication and Key Agreement Protocol in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서의 익명성을 보장하는 사용자 인증 및 키 동의 프로토콜 설계)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.3-12
    • /
    • 2006
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'smart space' augmented with intelligence and enhanced with services. However, unless privacy concerns are taken into account early in the design process of various ubiquitous devices(e.g. mobile devices, PDAs, sensors, etc.). we will end up crating ubiquitous surveillance infrastructure. Also, it may inappropriate to use public key techniques for computational constrained devices in ubiquitous computing environment. In this paper, we propose efficient user authentication and ky agreement protocol not only to preserve anonymity for protecting personal privacy but also to be suitable for computational constrained devices in ubiquitous computing environments.

Deploying Ubiquitous Traffic Flow Control System under the ITS Environments (ITS 환경에 유비쿼터스 교통관리시스템 접목 가능성 연구)

  • Park, Eun-Mi;Oh, Hyun-Sun;Suh, Euy-Hyun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.5
    • /
    • pp.36-46
    • /
    • 2011
  • It is thought traffic flow management under the ubiquitous transportation system has great potential in view of individual vehicle data availability and V2V, V2I two-way communication environments. However, it is expected that deployment of the ubiquitous transportation system takes some time. Therefore it is necessary to evaluate the feasibility of the algorithm under the ITS environment. The speed management algorithm proposed in the previous research is revised to fit for the ITS data collection and information provision environment. And the feasibility of the algorithm is evaluated through simulation experiments.

A wireless sensor network approach to enable location awareness in ubiquitous healthcare applications

  • Singh, Vinay Kumar;Lim, Hyo-Taek;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.277-285
    • /
    • 2007
  • In this paper, we outline the research issues that we are pursuing towards building of location aware environments for mainly ubiquitous healthcare applications. Such location aware application can provide what is happening in this space. To locate an object, such as patient or elderly person, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. The cost of the system was reduced while the accuracy in our experiments was fairly good and fine grained between 7 and 12 cm for location awareness in indoor environments by using only the sensor nodes and wireless sensor network technology. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object.

M2M Architecture: Can It Realize Ubiquitous Computing in Daily life?

  • Babamir, Seyed Morteza
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.566-579
    • /
    • 2012
  • Ubiquitous computing called pervasive one is based on the thought of pervading ability of computation in daily life applications. In other words, it aims to include computation in devices such as electronic equipment and automobiles. This has led to disengagement of computers from desktop form. Accordingly, the notice in ubiquitous computing being taken of a world steeped in remote and wireless computer-based-services. Handheld and wearable programmed devices such as sense and control appliances are such devices. This advancement is rapidly moving domestic tasks and life from device-and-human communication to the device-and-device model. This model called Machine to Machine (M2M) has led to acceleration of developments in sciences such as nano-science, bio-science, and information science. As a result, M2M led to appearance of applications in various fields such as, environment monitoring, agricultural, health care, logistics, and business. Since it is envisaged that M2M communications will play a big role in the future in all wireless applications and will be emerged as a progressive linkage for next-generation communications, this paper aims to consider how much M2M architectures can realize ubiquitous computing in daily life applications. This is carried out after acquainting and initiating readers with M2M architectures and arguments for M2M. Some of the applications was not achievable before but are becoming viable owing to emergence of M2M communications.

Defending Against Today's Advanced Persistent Threats (최신 APT 해킹공격에 대한 방어)

  • Marpaung, Jonathan A.P.;Lee, HoonJae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.954-957
    • /
    • 2012
  • Recent high profile attacks have brought the attention of governments, corporations, and the general public towards the dangers posed by Advanced Persistent Threats. This paper provides an analysis of the attack vectors employed by these actors by studying several recent attacks. We present recommendations on how to best defend against these threats by better classification of critical information infrastructure and assets, people protection, penetration tests, access control, security monitoring, and patch management.

Design and Implementation of an Integrated Property Management System on Web using RFID (RFID 기반의 웹 통합자산관리 시스템 설계 및 구현)

  • Seo, Dong-Min;Yeo, Myung-Ho;Cho, Young-Jun;Park, Jun-Ho;Han, Ji-Yeong;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.10
    • /
    • pp.27-36
    • /
    • 2008
  • As ubiquitous computing technologies become the important paradigm for replacing internet based IT paradigm and developing the next generation IT, the research and development on the ubiquitous technologies are progressed actively. One of the core technologies for ubiquitous computing is RFID. In this paper, we design and implement the property management system as a new business item using the RFID since the demands for the u-business model that considers the ubiquitous environment are being grown. There are many properties in the organizations such as companies, schools and so on. Many users share these properties. Thus, these fields require efficient management systems for monitoring a variety of information such as the locations and the detailed information of the properties for the monitoring and lending services. We attach RFID tags to every property and monitor their information with our web-based management system. Our management system provides the monitoring service and the lending service for properties and users.

A Study on Safe Authentication Method for Security Communication in RFID Environment (RFID 환경에서 보안 통신을 위한 안전한 인증 방안에 관한 연구)

  • Ko, Hoon;Kim, Bae-Hyun;Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous computing environment has a lot of different things as for applying existing security technical. It needs authentication method which is different kinks of confidence level or which satisfies for privacy of user's position. Using range localizes appoint workstation or it uses assumption which is satify environment of client in Kerberos authentication method which is representation of existing authentication method but it needs new security mechanism because it is difficult to offer the condition in ubiquitous computing environment. This paper want to prove the result which is authentication method for user authentication and offering security which are using wireless certificate from experiment in ubiquitous environment. Then I propose method which is offering security and authentication in ubiquitous environment.

  • PDF